Internet Security Policy

When you are in the process of adding an item to your shopping cart and checking out, you will see the padlock in the bottom right-hand corner of your browser. This will let you know that SSL encryption is in place and that information being sent from this page is safe.

With respect to security:

We use industry-standard encryption technologies from Go Daddy when transferring and receiving consumer data exchanged with our site. We have appropriate security measures in place in our physical facilities to protect against the loss, misuse or alteration of information that we have collected from you at our site. is a McAfee Secure certified site and is daily tested to pass the Payment Card Industry (PCI) Data Security Standard requirements of Visa CISP and AIS, MasterCard SDP and American Express DSS programs. McAfee Secure sites help keep you safe from identity theft and credit card fraud.


Encryption is the security technology which protects the privacy of information sent over a network.

What is SSL?

SSL stands for Secure Sockets Layer, a technology for managing the security of online message transmission. SSL encrypts or scrambles any information sent from your browser to the server you are connected to, making it impossible to intercept or tamper with the information on the way.

Why is encryption important?

Web or eBusiness systems may hold data that you wish to protect, such as business critical or personal information. Encryption increases the security of data transmissions, reducing the risk of third-party observers being privy to content. Encryption can also be used for stored data. Encryption can help protect your web site or eBusiness information assets from unauthorized access.

How does encryption work?

On the Internet, there are two main uses for encryption.

  • One occurs when you visit a “secure” Website, such as an online store or shopping mall. This is called server-side encryption because it uses the Server Certificate given to the server (computer) that runs the Website.
  • The other use occurs when you send or receive encrypted e-mail. In both cases, the encryption process involves exchanging public keys.

When encrypting information, the encryption process is done with either a public or a private key and then decrypted with the matching public or private key. Think of it as a lock that requires one key to close the lock and another key to open the lock.

For example, when you visit a secure Website, your computer receives the Website’s public key. When your computer sends information to the Website, your computer encrypts it using the Website’s public key. The only way to decrypt the information you are sending is with the web site’s private key.